The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For the complex system subject to external detrimental factors and internal wear failures, both the proper protection and efficient maintenance activities on the system elements should be considered in order to maintain a desired level of system availability. A maintenance strategy consisting of preventive replacement and minimal repair is introduced, and the probability of destruction by external...
In this work, we study the parity complexity measures pCmin[f] and PDT[f]. Pcmin[f] is the parity kill number of f, the fewest number of parities on the input variables one has to fix in order to "kill" f, i.e. To make it constant. PDT[f] is the depth of the shortest emph{parity decision tree} which computes f. These complexity measures have in recent years become increasingly important...
This paper proposed a method of map building combined sonar and human-robot interaction. Robot builds the border of an unknown environment by its sonar, and then a user controls the robot to walk forward, back, left and right so that the robot is able to walk around an obstacle along its border. By this way, the robot walks around all obstacles in the environment one by one while a map building method...
Deploying false targets is an effective measure to increase the survivability of genuine object when it encounters intentional attacks. Existing researches have mainly assumed that the false target is perfect or can be detected with a constant detection probability. In this paper, it is assumed that both genuine object and false target are possible to be detected. The detection probability of the...
In traditional Chinese medicine (TCM), it is frequently found that more than one syndrome of a patient are recognized in clinical practice, which has its own symptoms and signs. While, most algorithms are used to solve issues of syndrome diagnosis that only focus on one syndrome. Therefore, we proposed a hybrid intelligent syndrome diagnosis (HISD) model. Methods. The HTSD model combined feature selection...
In this article, we explore relationship among the employees' compensation equity, subjective well-being and turnover intention of the Chinese enterprise employees. We explored the relationship among the three variables in detail by the correlation analysis and regression analysis. The main conclusions of this article are as the following: (1) Employees' compensation equity had some positive correlations...
The authors conducted a meta-analysis about the relationship between Information Technology (IT) capability and business performance which aggregates empirical findings from the information technology literature. This paper confirms that IT capability has significant impact on business performance. Our research also finds that different types of IT capability measurement, different types of performance...
A significant amount of renewable energy based power is being integrated at the distribution or sub-transmission level worldwide, known as Distributed Generation (DG). And the Doubly-Fed Induction Generator (DFIG) based wind turbine is one of the utmost important branches of DG development. However, the DFIGs suffer from high sensitivity from system disturbance that they cannot keep connection with...
This paper proposes a dynamic partial reconstruction multicast routing algorithm (DPRA-MAODV), based on the analysis of MAODV agreement, combine with the dynamic partial reconstruction protocol. The creative use of the concept "event trigger", efficient implementation of partial reconstruction operation about the dynamic multicast tree in Ad hoc network, to optimize the total cost of the...
The kernel of implementing condition based maintenance (CBM) is the selection of optimal maintenance opportunity which is estimated by prognostic tool. Without considering the randomness of prognostic result, the unnecessary preventive maintenance and unnecessary system failures cannot be avoided. In order to improve the system performance under CBM policy, the impact of prognostic error on CBM efficiency...
A fractional order model method based on Mittag-Leffler Functions for education evaluation is proposed in this paper. Course evaluation is necessary means to ensure the improvement of course construction level. Firstly, analytical solution of linear fractional-order systems is promoted. Secondly, fractional order model of course evaluation is proposed. And fractional evaluation model is composed of...
The financial strait is the major problem for the small and medium enterprises have to face when they want to develop their business all over the world. It is the very important approach to establish the credit guaranty system to help the small and medium enterprises to solve the problem and the government should take the important responsibility in the process. Based on the analysis about the position...
This paper presents a method to determine music-motion correspondence.For specific type of dance and music,system extract low-level features,calculate correspondence ,then select muisc-motion correspondence using genetic algorithms,and get a correspondence satisfing match accuracy and operation speed in the end.The experimental results indicate that system fully express the changes between music and...
This article used the event study method to study the sample stock of shang hai stock exchange, the research indicated that the block trading paid certain influence on the stock price, as the capital size of stock and the market environment change, the result will different.
Curriculum evaluation is an important part of educational assessment. Gray relational analysis method can be applied to course evaluation in this paper. Grey correlation degree reflects the distance between a selected scheme and the ideal solution. The method was applied to actual course assessment situation of Capital Normal University Information Engineering College. The results indicate that this...
Edge contraction simplification based on DEM terrain algorithm is proposed as a new terrain simplification algorithm which is based on DEM terrain data characteristics. The algorithm introduces the gradient of triangle, and combines with gradient and the length of edges as weight of the vertex to represent the importance of a vertex. By using the vertex weight, we can constrain the region being affected...
Currently there are many problems in the engineering education in China, mostly due to that the collaborations between universities and enterprises are so insufficient that the students are always lack of necessary engineering practice. Consequently, reformation of engineering education is needed in order to address this issue, in the background of which the project discussed in this paper is carried...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.